Login / Signup

Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation.

Nianhang HuMengmei YeSheng Wei
Published in: IEEE Trans. Emerg. Top. Comput. (2019)
Keyphrases
  • information leakage
  • low cost
  • personal information
  • data sets
  • feature space
  • data collection
  • spatial domain
  • error correction